Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 6 |
Descriptor
Source
| Education and Information… | 6 |
Author
Publication Type
| Journal Articles | 6 |
| Reports - Research | 6 |
| Information Analyses | 1 |
Education Level
| Secondary Education | 2 |
| Early Childhood Education | 1 |
| Higher Education | 1 |
| Kindergarten | 1 |
| Postsecondary Education | 1 |
| Preschool Education | 1 |
| Primary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marek Vydra; Jozef Kovácik – Education and Information Technologies, 2025
We investigated the effect of short-term teaching (3 weeks) using image analysis on gymnasium/secondary school students' (ISCED3A) skills (science process skills, SPS) and knowledge using Fiji (ImageJ) software. The theoretical teaching was combined with IT-based education (measurement of the area or signal intensity on photos from scientific…
Descriptors: Science Instruction, Teaching Methods, Biology, Botany
Guozhu Ding; Xiangyi Shi; Shan Li – Education and Information Technologies, 2024
In this study, we developed a classification system of programming errors based on the historical data of 680,540 programming records collected on the Online Judge platform. The classification system described six types of programming errors (i.e., syntax, logical, type, writing, misunderstanding, and runtime errors) and their connections with…
Descriptors: Programming, Computer Science Education, Classification, Graphs
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Mohan Honnagudi Gururaj; Nandish Malleshappa; Sankhya Nagesh Nayak; Devaraj Fakkirappa Vadenapur; Benak Patel Medugondanahalli Puradaswamy – Education and Information Technologies, 2024
A Study with undergraduate engineering students was conducted in order to evaluate whether cognitive and comprehending ability can be improved by incorporating the tool based learning. The simulator tools and virtual labs were used to represent tool based learning. The study was conducted on three different years of students. In the first stage…
Descriptors: Undergraduate Students, Engineering Education, Evaluation, Comprehension
Liu, Xia; Xu, Yunrong; Pange, Jenny – Education and Information Technologies, 2016
Nowadays, with the rapid progress of Information and Communication Technologies (ICTs), the integration of ICTs in education has attracted more and more attention of educators and researchers. However, there are different situations between developed and less-developed nations both in ICT application and in ICT research. PowerPoint is a readily…
Descriptors: Information Technology, Foreign Countries, Visual Aids, Computer Software
Kafyulilo, Ayoub; Fisser, Petra; Voogt, Joke – Education and Information Technologies, 2016
This study investigated the impact of teacher design teams as a professional development arrangement for developing technology integration knowledge and skills among in-service science teachers. The study was conducted at a secondary school in Tanzania, where 12 in-service science teachers participated in a workshop about technology integration in…
Descriptors: Technology Integration, Science Teachers, Foreign Countries, Professional Development

Peer reviewed
Direct link
